UMA

Comments Off on Open Algorithms (OPAL): Key Concepts

Open Algorithms (OPAL): Key Concepts

The following are the key concepts and principles underlying the open algorithms paradigm: Moving the algorithm to the data: Instead of pulling raw data into a centralized location for processing, it is the algorithms that should be sent to the data repositories and be processed there. Raw data must never leave its repository: Raw data Read More

Comments Off on UMA Presentation from IIW#16

UMA Presentation from IIW#16

Eve Maler kindly prepared an excellent set of slides for me to present at IIW#16 in Mountain View, CA late April: UMA_for_IIW16_2013-05 After discussions during the presentation, I believe one of the technical issues that still causes confusion is the fact that UMA uses three (3) distinct OAuth2.0 Tokens: AAT Tokens: Authorization API Token — this Read More

Comments Off on Limitations of the OAuth 2.0 definition of “Client”

Limitations of the OAuth 2.0 definition of “Client”

I believe the OAuth 2.0 definition of the “client” is too restrictive, and by doing so it has effectively closed-off any possibility of OAuth 2.0 entertaining true third party access on the Internet. Although OAuth speaks in terms Alice-to-Bob sharing of resources, in reality it caters only as far as Alice-to-client sharing (where the “client” is Read More

Comments Off on UMA, OpenID-Connect & OAuth2.0

UMA, OpenID-Connect & OAuth2.0

Eve Maler has devised a very useful diagram (for our Google techTalk presentation), comparing the features and intended purposes of OAuth2.0, OpenID-Connect and UMA.  Interestingly, the diagram also shows what can be achieved using the venn combinations of two out of three technologies.